277 research outputs found

    Raising Students\u27 Concept in Protecting Information Privacy through Information Ethics Education

    Get PDF
    The concept of privacy in Chinese context is a fragile perception. Under such a culture environment, the awareness of right of privacy raises late; therefore, it is of necessary raising people the concept of information privacy. To reach this purpose, this study adopts the theory of self-efficacy to examine factors that influence decisions related to information privacy. Further, a longitudinal model is explored whether information ethics education plays a role influencing students’ concept in protecting information privacy. A survey with senior-level undergraduate students is conducted to test the hypothesized model. The findings exhibit an important insight that through information ethics education, students demonstrate a significant change in their confidence of privacy self-efficacy; the increase of this concept noteworthy changes their behavior concerning information privacy protection. Finally, discussions and conclusions are discussed

    Exploring Consumers\u27 Keyword Ads Search Behaviors: An Integration of Theory of Planned Behavior and Flow Theory

    Get PDF
    In the 21st century, e-Commerce and online shopping have come to a stage of steady growth. To encourage consumers to shop online, Internet advertising has become one of the most common strategies for online marketing. The combining traditional and online advertising become a popular marketing strategy and growingly prevalent in Taiwan. While consumers\u27 keyword search behavior is an information-gathering behavior before they make purchase, the advertisers ultimately wish consumers\u27 clicking on Internet advertisements would get them fascinated with certain products. Therefore, this paper adopted the theory of planned behavior as the theoretical background, and the flow theory and perceived creativity were the important antecedent beliefs to explore the consumers\u27 keyword ads search behaviors. An online survey was conducted and a total of 280 usable responses were collected, constituted a response rate of 76.1%. Our results suggested that TPB provided a reasonable depiction of consumers\u27 keyword ads search behaviors. And the flow experience and perceived creativity were the significant antecedent beliefs in our research model. Altogether, the research findings show that all the hypotheses were statically significant except the relationship between the perceived behavior control and keyword search behavior. Based on the research findings, implications and limitations are discussed

    Examining How the Disclosure of IS Security Policies Affect IS Personnel Ethical Conducts

    Get PDF
    The issue of “professional ethics” in the workplace has been put under the spotlight in recent years; especially several scandals have involved questionable behaviour on the part of information systems (IS) professionals. In the past years, many countries have constructively paid attention to the rules of professional ethics. Among these efforts, many acts asked for corporate information disclosures, for example, the disclosure of IS security and privacy policies. In this study, two research questions are explored. The first of these investigates the disclosure of IS security policies and perception of codes in Taiwan IS corporations. The second empirically validates a research model to understand whether the disclosure of IS security policies have any influence on the IS professionals\u27 perceptions of codes, and in turn, how these perceptions impact their ethical and unethical conducts. Finally, the theoretical and practical implications to the management of ethics concerning information ethics are discussed

    The Impact of Self-Monitoring on Theory of Planned Behavior:Study of Web Portal Usage

    Get PDF
    With the prosperity of the Internet and WWW, lots of web sites have been raised. The eBusinessWeekly 2000 reported that “web portal” was with highly proportion (46.1%) among all kind of the websites; this reveals that web portal would be the place where Internet users visit most often. Since the Internet is widely popular, user’s perception to use such WWW technology was easy to understand. In this research, we study the personality trait of self-monitoring on the Internet web portal usage behavior. Thus, we focused on the concept of self-monitoring in exploring the attitude, web self-efficacy, intention and web portal usage to see the variation in this concept. The combined dataset shows that attitude toward web portal and web self-efficacy are significant impacted on intention, and actual web portal usage is significant influenced by both intention and web self-efficacy. Further, the differences between high self-monitoring (HSM) group and low self-monitoring (LSM) group are observed and have significant di inct in our research model, therefore two moderating hypotheses are both supported. Base on the research findings, conclusions and implications are discussed

    Internet Privacy Information Propagation Model

    Get PDF
    With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-Infected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy

    A Study of the Effect of Anger on Immoral Judgment of Internet Privacy Invasion

    Get PDF
    With the emergence of Web 2.0, people are able to share their thoughts and photos with their friends and strangers. Yet, they also risk invasion of their privacy. Information privacy has therefore become an important issue in the information age. In this research, we focus on the influence of anger on immoral judgment of privacy invasion in cyberspace. Specifically, two scenarios, nonviolent and violent-depiction, are designed to investigate the influence of anger on immoral decision making. Our results revealed that the level of anger will increase immoral judgment in nonviolent and violent depiction scenarios, respectively. And the level of anger in violent-depiction scenario is higher than in nonviolent-depiction scenario. The research findings show that college students easily make an immoral judgment in violent situations. In violent depiction scenario, however, high moral obligation group can enhance the effect of ethical self-efficacy for moral judgment

    Phenome-wide analysis of Taiwan Biobank reveals novel glycemia-related loci and genetic risks for diabetes

    Get PDF
    To explore the complex genetic architecture of common diseases and traits, we conducted comprehensive PheWAS of ten diseases and 34 quantitative traits in the community-based Taiwan Biobank (TWB). We identified 995 significantly associated loci with 135 novel loci specific to Taiwanese population. Further analyses highlighted the genetic pleiotropy of loci related to complex disease and associated quantitative traits. Extensive analysis on glycaemic phenotypes (T2D, fasting glucose and Hb

    Identification of the Ankyrin Repeat Proteins ANKRA and RFXANK as Novel Partners of Class IIa Histone Deacetylases

    Get PDF
    Eighteen human histone deacetylases (HDACs) have been identified, and according to their sequence similarity to yeast homologs, these enzymes are grouped into distinct classes. Within class II, HDAC4, HDAC5, HDAC7, and HDAC9 share similar domain organization both within the N-terminal extension and the C-terminal catalytic domain, thus forming a subclass known as class IIa. These HDACs function as signal-responsive transcriptional corepressors. To gain further insight into their function and regulation, we utilized an N-terminal fragment of HDAC4 as bait in yeast two-hybrid screens, which uncovered myocyte enhancer factor 2C, 14-3-3zeta, and ankyrin repeat family A protein (ANKRA). ANKRA is a poorly characterized protein with an ankyrin repeat domain similar to RFXANK, a subunit of the trimeric transcription factor RFX. Mutations on genes of the RFX subunits and the coactivator CIITA are responsible for the bare lymphocyte syndrome, an immunodeficiency disorder attributed to the lack of major histocompatibility complex class II (MHCII) antigens. Through its ankyrin repeat domain, RFXANK interacted with HDAC4. Two RFXANK-binding sites were found on HDAC4 with one located within residues 118-279 and another within residues 448-666. Interestingly, this deacetylase also interacted with CIITA. Consistent with the physical interaction with RFXANK and CIITA, HDAC4 and homologs repressed MHCII expression. These results identify ANKRA, RFXANK, and CIITA as novel targets of class IIa HDACs and suggest that these deacetylases play a role in regulating MHCII expression

    Active gas features in three HSC-SSP CAMIRA clusters revealed by high angular resolution analysis of MUSTANG-2 SZE and XXL X-ray observations

    Get PDF
    International audienceWe present results from simultaneous modelling of high angular resolution GBT/MUSTANG-2 90 GHz Sunyaev–Zel’dovich effect (SZE) measurements and XMM-XXL X-ray images of three rich galaxy clusters selected from the HSC-SSP Survey. The combination of high angular resolution SZE and X-ray imaging enables a spatially resolved multicomponent analysis, which is crucial to understand complex distributions of cluster gas properties. The targeted clusters have similar optical richnesses and redshifts, but exhibit different dynamical states in their member galaxy distributions: a single-peaked cluster, a double-peaked cluster, and a cluster belonging to a supercluster. A large-scale residual pattern in both regular Compton-parameter y and X-ray surface brightness distributions is found in the single-peaked cluster, indicating a sloshing mode. The double-peaked cluster shows an X-ray remnant cool core between two SZE peaks associated with galaxy concentrations. The temperatures of the two peaks reach ∌20–30 keV in contrast to the cool core component of ∌2 keV, indicating a violent merger. The main SZE signal for the supercluster is elongated along a direction perpendicular to the major axis of the X-ray core, suggesting a minor merger before core passage. The and y distributions are thus perturbed at some level, regardless of the optical properties. We find that the integrated Compton y parameter and the temperature for the major merger are boosted from those expected by the weak-lensing mass and those for the other two clusters show no significant deviations, which is consistent with predictions of numerical simulations
    • 

    corecore